clone the flipper repo
git clone [email protected]:flipperdevices/flipperzero-firmware.git
download the build tools requirements
pip3 install -r scripts/requirements.txt
cd applications/plugins
clone the flipper repo
git clone [email protected]:flipperdevices/flipperzero-firmware.git
download the build tools requirements
pip3 install -r scripts/requirements.txt
cd applications/plugins
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <meta charset="utf-8"> | |
| <meta name="viewport" content="width=device-width"> | |
| <title>Paxton Fob converter</title> | |
| <style> | |
| table, th, td, div { | |
| border: 1px solid black; | |
| } |
A newer version of this info is available at https://badcfe.org/how-to-paxton-with-rfidler/
Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring:

Paxton readers often look like this:
| import re, random, operator | |
| random.seed() | |
| def get_random_int(): | |
| return random.randint(1,999) | |
| def to_soroban(number): | |
| digits = { | |
| 0: "**** || *", | |
| 1: "*** *|| *", |
| import random, operator | |
| random.seed() | |
| def get_random_int(): | |
| return random.randint(2, 12) | |
| numberOfQs = 10 | |
| ops = {"+": operator.add, | |
| "-": operator.sub, | |
| "*": operator.mul, |
| /* | |
| * | |
| */ | |
| #include <stdio.h> | |
| #include <math.h> | |
| #define MODMULT(a, b, c, m, s) q = s/a;s=b*(s-a*q)-c*q;if(s<0)s+=m; | |
| /* MODMULT computes s*b mod m, provided that m=a*b+c and 0<=c<m */ |
| <?php | |
| class Lcg | |
| { | |
| private $s1 = 0; | |
| private $s2 = 0; | |
| public function __construct($s1, $s2) | |
| { | |
| $this->s1 = $s1; |
| <?php | |
| class MersenneTwister | |
| { | |
| const STANDARD = 1; | |
| const PHP = 2; | |
| // Create a length 624 array to store the state of the generator | |
| private $MT; |
| $time = time(0); | |
| $pid = getmypid(); | |
| echo 'time is: ',$time,' (just the unix timestamp so very guessable)',PHP_EOL; | |
| echo 'pid is: ',$pid, ' (process id of current PHP process usually in 1000s )',PHP_EOL; | |
| $rand = mt_rand(); | |
| echo 'Output of 1st call to uninitialized to mt_rand is: '.$rand,PHP_EOL; | |
| echo 'Output of 2nd call to uninitialized to mt_rand is: '.mt_rand(),PHP_EOL; | |
| echo 'Output of 3rd call to uninitialized to mt_rand is: '.mt_rand(),PHP_EOL; | |
| echo 'Guessing the seed now: ',PHP_EOL; |
| import random | |
| from Ecc import Ecc | |
| from Ecc import Point | |
| A = -95051 | |
| B = 11279326 | |
| p = 233970423115425145524320034830162017933 | |
| q = 233970423115425145498902418297807005944 | |
| ecc = Ecc(A, B, p) |